Planning for Security Management

The authors' intrusion detection system integrates PlanNet, a constraint-based planner, to perform security management in computer networks. The system dynamically computes reconfiguration and repair plans, retrieving only the information needed to compute the plan.

[1]  Maria Gini,et al.  Deferred Planning and Sensor Use , 1990 .

[2]  Daniel S. Weld,et al.  Planning to gather inforrnation , 1996, AAAI 1996.

[3]  Qiang Yang,et al.  A Theory of Conflict Resolution in Planning , 1992, Artif. Intell..

[4]  Michela Milano,et al.  Interactive Constraint Satisfaction techniques for Information Gathering in Planning , 1998, ECAI.

[5]  Qiang Yang,et al.  Delaying Variable Binding Commitments in Planning , 1994, AIPS.

[6]  Barry Richards,et al.  parcPlan: A Planning Architecture with Parallel Actions, Resources and Constraints , 1994, ISMIS.

[7]  Karen L. Myers A Procedural Knowledge Approach to Task-Level Control , 1996, AIPS.

[8]  C T Dinardo,et al.  Computers and security , 1986 .

[9]  Keith Golden,et al.  Representing Sensing Actions: The Middle Ground Revisited , 1996, KR.

[10]  Daniel S. Weld,et al.  Probabilistic Planning with Information Gathering and Contingent Execution , 1994, AIPS.

[11]  Martha E. Pollack,et al.  Passive and active decision postponement in plan generation , 1996 .

[12]  S. E. Smaha Haystack: an intrusion detection system , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[13]  S. Kambhampati Using Disjunctive orderings instead of Conflict Resolution in Partial order planning , 1996 .

[14]  P. Mello,et al.  Least Commitment on Variable Binding in Presence of Incomplete Knowledge , 1999, ECP.

[15]  Charles E. Kahn,et al.  A common intrusion detection framework , 2000 .

[16]  Michael J. Maher,et al.  Constraint Logic Programming: A Survey , 1994, J. Log. Program..

[17]  H. S. Teng,et al.  Security audit trail analysis using inductively generated predictive rules , 1990, Sixth Conference on Artificial Intelligence for Applications.

[18]  P. Yang A Theory of Con ict Resolution in , 1992 .

[19]  Keith Golden,et al.  Planning and knowledge representation for softbots , 1997 .

[20]  Evelina Lamma,et al.  Constraint Propagation and Value Acquisition: Why we should do it Interactively , 1999, IJCAI.

[21]  Daniel S. Weld,et al.  Planning to Gather Information , 1996, AAAI/IAAI, Vol. 1.

[22]  Daniel S. Weld An Introduction to Least Commitment Planning , 1994, AI Mag..

[23]  Sandeep Kumar,et al.  A Software Architecture to Support Misuse Intrusion Detection , 1995 .

[24]  M.P. Georgeff,et al.  Procedural knowledge , 1986, Proceedings of the IEEE.

[25]  Oren Etzioni,et al.  OS Agents: Using AI Techniques in the Operating System Environment , 1993 .